Quantitative Risk Analysis of Asset Information Technology at STT Pagaralam

Buhori Muslim

Abstract


Information technology (IT) applications in organizations are very important to do this to support the effectiveness and efficiency of the organization's business processes. IT assets are the most important component in the company's business processes (organization) today, which has a high vulnerability to the risks that occur. non-functioning of IT assets because threats (risks) can systematically disrupt performance. The technical implementation unit (UPT) at STT Pagar Alam is responsible for managing IT assets. IT assets that are the object of this research include hardware consisting of monitors, CPUs, projectors, stavolt, printers and laptops with a considerable quantity. departing from the management's needs when identifying risk factors that need to be given maintenance priority and the type of IT assets to identify and measure IT assets using the Quantitative risk analysis (QRA) method so that known aspects and factors need special attention effectively and efficiently. This study produced recommendations on the type of IT assets in the form of CPUs and the types of power loss risk factors that require priority for further control measures.

Keywords


Applications, IT assets, QRA, CPU & Power Loss.

Full Text:

PDF

References


Anthony, Rully., 2008. Mengenal perbankan Indonesia. Diperoleh dari http://hukum-perbankan.blogspot.com. [accessed: 05-11-2018].

Merrit, J.W. 2000. A Method for quantitative risk analysis. CISSP.Wang global. Virginia. Diperoleh dari http://csrc.nist.gov/nissc/1999/proceeding/papers/p28.pdf. [Accessed: 05-11-2018].

Muslim, Buhori.,2017. Pengantar teknologi informasi, ed.1, cet.1—Yogyakarta: Deepublish, Agustus 2017.

Muslim, Buhori. 2014. Analisis Rencana Aplikasi Teknologi Informasi Pada STT Pagar Alam, Proseding Semnastik & Magma, UBD. UBD Pres. Palembang. p.388-396.

Peltier, T.R. 2001. Information security risk analysis. 2nd edition., USA: CRC Press. Boca raton. Florida. United states. Diperoleh dari http://antoanthongtin.vn/Portals/0/UploadImages/kiennt2/Sach/Sach-CSDL4/Information%20Security%20Risk%20Analysis,%202%Ed..pdf. [Accessed: 05-11-2018].

Tan, Ding. 2002. Quantitative risk analysis step-by-step, SANS Institute 2003. Diperoleh dari http://www.sans.org/reading-room/whitepapers/auditing/quantitative-risk-analysis-step-by-step-849. [Accessed: 05-11-2018]

Isro Mukti., Yogi. 2018., “Sistem Informasi Manajemen Aset Sekolah Tinggi Teknologi Pagaralam Berbasis Web”. Seminar Nasional Teknologi Informasi Dan Komunikasi (SEMNASTIK) X, Palembang-Indonesia, 19 Oktober 2018

A. Jones and D. Ashenden.2005. Risk management for computer security: Protecting your network and information assets, 1st Edition. Elsevier Butterworth–Heinemann, 2005.




DOI: http://dx.doi.org/10.28989/senatik.v4i0.186

Article Metrics

Abstract view : 409 times
PDF - 681 times

Refbacks

  • There are currently no refbacks.




Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Conference SENATIK P-ISSN :2337-3881 and  E-ISSN : 2528-1666

Jumlah penggunjung = Web Analytics orang

Statistik Senatik

Flag Counter